Maximal Antichain Lattice Algorithms for Distributed Computatio
|
|
- Ronald Blake
- 5 years ago
- Views:
Transcription
1 Maximal Antichain Lattice Algorithms for Distributed Computations Vijay K. Garg Parallel and Distributed Systems Lab, Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin, TX garg
2 Model of a Distributed Computation: Poset distributed computation = poset (partially ordered set) (E, ) where E = is the set of events, and is (happened-before) relation. P1 a d P1 (1,0,0) (2,1,0) P2 b f P2 (0,1,0) (0,2,1) P3 c e P3 (0,0,1) (1,0,2) (i) Events can be timestamped in an online fashion using Vector Clocks such that e f V (e) < V (f ). (ii)
3 Computing Meet and Join d e f a b c Meet of a subset of events meet of {d, e} meet of {a,b} meet of {e,f} Join of a subset of events Lattice: a poset in which all finite subsets have meets and joins.
4 Consistent Cuts of a Distributed System G 1 G 2 P 1 P 2 P 3 m 1 m 2 m 3 Consistent cut = set of events executed so far A subset G of E is a consistent cut (consistent global state) if e, f E : (f G) (e f ) (e G) Same as the order ideal of the partial order (E, ).
5 Motivation: Detecting Global Conditions in Distributed Systems {a,b,c,d,e,f} {a,b,c,d,e} {a,b,c,d,f} {a,b,c,e,f} {a,b,c,d} {a,b,c,e} {a,b,c,f} {a,b,d} {a,c,e} {a,b,c} {b,c,f} {a,b} {a,c} {b,c} {d,e,f} d e f {a} {b} {c} {a,f} {c,d} {b,e} a b c {} {a,b,c} Traversing a significantly smaller lattice of maximal antichains rather than consistent cuts for certain predicates
6 Outline of the Talk Motivation Incremental Lattice Algorithms Lattice Enumeration Algorithms Applications to Global Predicate Detection Conclusions and Future Work
7 Ideals and Antichains d e f a b c Poset P = (X, ) Ideal: Q X is an ideal if f is in Q and e f, then e is also in Q. Antichain: Y X is called an antichain, if every distinct pair of elements from Y are incomparable.
8 Maximal Antichains {a,b,c,d,e,f} {d,e,f} d e f {a,b,c,f} {a,b,c,d} {a,b,c,e} {a,f} {c,d} {b,e} a b c {a,b,c} {a,b,c} Maximal Antichain: An antichain A is maximal if every element not in A is comparable to some element in A. {d, e} is an antichain but not a maximal antichain {d, e, f } is a maximal antichain Maximal Ideal: An ideal Q is maximal antichain ideal if its maximal elements forms a maximal antichain. {a, b, c, d} and {a, b, c, e} are maximal ideals {a, b, c, d, e} is not a maximal ideal
9 Important Lattices Associated with a Poset Lattice of Interpretation in DC References Ideals consistent global states [Mattern88, CM91,..] Normal Cuts Smallest lattice containing P [Garg OPODIS12] Maximal Ideals State for maximal antichain [JRJ94, this paper] Table: Summary of Lattices for Distributed Computations modeled as a poset P
10 Related Work: Incremental Algorithms Elements of the computation arrive in a sorted order Input: poset P, its lattice of maximal antichains L, element x Output: L := lattice of maximal antichains of P {x} Incremental Algorithms Time Complexity Space Complexity [Jourdan, Rampon, Jard 94] O(w 3 m) O(mn log n) [Nourine and Raynaud 99, 02] O(mn) O(mn log n) Algorithm ILMA [this paper] O(wm log m) O(mw log n) Algorithm OLMA [this paper] O(m x w 2 log w L )) O(w L w log n) Symbol Definition Symbol Definition n size of the poset P m size of the lattice L w width of the poset P m x # (strict ideals D(x)) w L width of the lattice L
11 Strict Ideals D(A) = the set of elements strictly smaller than A Strict Ideal: A set Y is a strict ideal if there exists an antichain A such that D(A) = Y. d e f a b c Example: {a, b} is a strict ideal. {a, b, c, d} is not.
12 Equivalence of maximal ideals and strict ideals d e f a b c {a,b,c,d,e,f} {d,e,f} {a,b,c} {a,b,c,f} {a,b,c,d} {a,b,c,e} {a,f} {c,d} {b,e} {b,c} {a,b} {a,c} {a,b,c} {a,b,c} {} Lattices of maximal ideals, maximal antichains, and strict ideals are isomorphic. Mapping from strict ideals to maximal antichains: S is mapped to the minimal elements of the complement of S.
13 Incremental Algorithm 1 Input: P: a finite poset as a list of vector clocks L: lattice of maximal antichains of vector clocks x: new element Output: L := Lattice of maximal antichains of P {x} initially L // Step 1: Compute the set D(x) Let V be the vector clock for x on process P i ; S := V ; S[i] := S[i] 1; // Step 2: if S L then L := L {S}; forall vectors W L: if max(w, S) L then L := L max(w, S);
14 Example Poset and its lattice of maximal antichains (3,2,2) (3,2,1) (2,1,2) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)
15 Example Step 1: D[x] = (1, 0, 0) D(x) = (0, 0, 0), strict ideals added: (0, 0, 0) Set of Maximal Antichains = {(1, 0, 0)} (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (1,0,0) (1,0,0)
16 Example Step 2: D[x] = (2, 0, 0) D(x) = (1, 0, 0), strict ideals added: (1, 0, 0) Set of Maximal Antichains = {(1, 0, 0), (2, 1, 1)} (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)
17 Example Step 3: D[x] = (1, 1, 0) D(x) = (1, 0, 0), strict ideals added: φ Set of Maximal Antichains = {(1, 0, 0), (2, 1, 1)} (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)
18 Example Step 4: D[x] = (1, 0, 1) D(x) = (1, 0, 0), strict ideals added: φ (3,0,0) (2,2,0) (1,1,2) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)
19 Example Step 5: D[x] = (3, 0, 0) D(x) = (2, 0, 0), strict ideals added: (2, 0, 0) Maximal antichain added: (3, 1, 1) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)
20 Example Step 6: D[x] = (2, 2, 0) D(x) = (2, 1, 0), strict ideals added: (2, 1, 0) Maximal antichain added: (3, 2, 1) (3,2,1) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)
21 Example Step 6: D[x] = (1, 1, 2) D(x) = (1, 1, 1), strict ideals added: (1, 1, 1), (2, 1, 1) Maximal antichains added: {(2, 1, 2), (3, 2, 2)} (3,2,2) (3,2,1) (2,1,2) (3,0,0) (2,2,0) (1,1,2) (3,1,1) (2,0,0) (1,1,0) (1,0,1) (2,1,1) (1,0,0) (1,0,0)
22 Analysis of the Incremental Algorithm 1 1 Simple Algorithm 2 To check if max(s, W ) L, maintain L as a binary search tree 3 Requires storage of the the entire lattice (exponential in size of the poset in the worst case)
23 Space Efficient Incremental Algorithm Input: a finite poset P, x maximal element in P = P {x} Output: enumerate M such that L MA (P ) = L MA (P) M (1) S := the vector clock for x on process P i ; (2) S[i] := S[i] 1; (3) if S is not a strict ideal of P then (4) // BFS(S): Do Breadth-First-Search traversal of M (5) T := set of vectors initially {S}; (6) while T is nonempty do (7) H := delete the smallest vector from T ; (8) enumerate H; (9) foreach process k with next event e do (10) explore H using e; (11) endfor; (12) endwhile; (13) endif;
24 Outline of the Talk Motivation Incremental Lattice Algorithms Lattice Enumeration Algorithms Applications to Global Predicate Detection Conclusions and Future Work
25 Motivation for Enumeration of Maximal Antichains Global predicate detection requires enumeration not construction of the lattice Lattice of maximal antichains may be exponential in the number of processes
26 Related Work: Enumeration Algorithms Input: a nonempty finite poset P Output: enumerate all elements of L := DM-completion of P Algorithm Time Space [Jourdan, Rampon, Jard 94] O((n + w 2 )wm) O(mn log n) [Nourine and Raynaud 99, 02] O(mn 2 ) O(mn log n) Algorithm ILMA [this paper] O(nwm log m) O(mw log n) BFS-MA [this paper] O(mw 2 log m) O(w L w log n) DFS-MA [this paper] O(mw 4 ) O(nw log n) Lexical by [Ganter84] O(mn 3 ) O(n log n) The parameters are: n: size of the poset P, m: size of the lattice L of normal cuts of P, w: width of the poset P, w L : width of the lattice L.
27 Enumeration using Closed Sets closure(y ) = smallest maximal antichain ideal that contains Y. The operator closure(y ) is monotone, extensive and idempotent. Idea: View the lattice of maximal antichains as a directed graph and enumerate the nodes of the graph using the closure operator. Difficulty: Usual DFS on graph cannot be employed as the graph cannot be stored. Cannot mark which nodes have been visited before.
28 Depth First Search Enumeration of Maximal Antichain Ideals Input: a finite poset P, starting state G Output: DFS Enumeration of Maximal Antichain Ideals of P (1) output(g); (2) foreach event e enabled in G do (3) K := closure(g {e}); (4) if (K covers G) and (not visited before) then (5) DFS(K);
29 How to avoid revisiting cuts? Visit a state only from the maximum predecessor. (4) if K does not cover G then go to the next event; (5) M := get-max-predecessor(k) ; (6) if M = G then (7) DFS-MaximalIdeals(K); To check whether K covers G: use the efficient characterization provided by [Reuter 91]. To choose the maximum predecessor Expand the nodes of the dual poset and choose the biggest predecessor
30 Outline of the Talk Motivation Incremental Lattice Algorithms Lattice Enumeration Algorithms Applications to Global Predicate Detection Conclusions and Future Work
31 Application to Global Predicate Detection Definition (Antichain-Consistent Predicate) A global predicate is an antichain-consistent predicate if 1 its evaluation depends only on maximal events of a consistent global state and 2 if it is true on a subset of processes, then presence of additional processes does not falsify the predicate. Examples of antichain-consistent predicates Violation of mutual exclusion: there is more than one process in the critical section. Violation of resource usage: there are more than k concurrent activation of certain service, Global Control Point: The predicate, B, Process P 1 is at line 35 and P 2 is at line 23 concurrently,
32 Equivalence in Global Predicate Detection Theorem There exists a consistent global state that satisfies an antichain-consistent predicate B iff there exists a maximal ideal that satisfies B.
33 Conclusions and Future Work An Incremental Algorithm to generate the lattice of maximal antichains BFS and DFS enumeration of maximal antichains Applications to global predicate detection Question: Is there a space-efficient algorithm with time complexity O(mw log n)?
Formal Methods for Monitoring Distributed Computations
Formal Methods for Monitoring Distributed Computations Vijay K. Garg Parallel and Distributed Systems Lab, Department of Electrical and Computer Engineering, The University of Texas at Austin, FRIDA 15
More informationMassachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr.
Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Quiz 1 Appendix Appendix Contents 1 Induction 2 2 Relations
More informationThe One-Quarter Fraction
The One-Quarter Fraction ST 516 Need two generating relations. E.g. a 2 6 2 design, with generating relations I = ABCE and I = BCDF. Product of these is ADEF. Complete defining relation is I = ABCE = BCDF
More informationData Mining and Analysis: Fundamental Concepts and Algorithms
Data Mining and Analysis: Fundamental Concepts and Algorithms dataminingbook.info Mohammed J. Zaki 1 Wagner Meira Jr. 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY, USA
More informationStrange Combinatorial Connections. Tom Trotter
Strange Combinatorial Connections Tom Trotter Georgia Institute of Technology trotter@math.gatech.edu February 13, 2003 Proper Graph Colorings Definition. A proper r- coloring of a graph G is a map φ from
More informationSolved and Unsolved Problems in Monitoring Distributed Computations
Solved and Unsolved Problems in Monitoring Distributed Computations Vijay K. Garg Parallel and Distributed Systems Lab, Department of Electrical and Computer Engineering, The University of Texas at Austin,
More informationHomework 02 Solution updated
CS3-Automata and Complexity Theory Homework 2 Solution updated Due On: 5hrs Wednesday, December 2, 25 Max Points: 25 Problem [5+5+5+ points] Give DFA for the following languages, over the alphabet {,}
More informationFractional Replications
Chapter 11 Fractional Replications Consider the set up of complete factorial experiment, say k. If there are four factors, then the total number of plots needed to conduct the experiment is 4 = 1. When
More informationApplying Predicate Detection to the Constrained Optimization Problems
Applying Predicate Detection to the Constrained Optimization Problems Vijay K. Garg, The University of Texas at Austin, Department of Electrical and Computer Engineering, Austin, TX 78712, USA arxiv:1812.10431v1
More informationASSOCIATION ANALYSIS FREQUENT ITEMSETS MINING. Alexandre Termier, LIG
ASSOCIATION ANALYSIS FREQUENT ITEMSETS MINING, LIG M2 SIF DMV course 207/208 Market basket analysis Analyse supermarket s transaction data Transaction = «market basket» of a customer Find which items are
More informationEfficient Dependency Tracking for Relevant Events in Concurrent Systems
Distributed Computing manuscript No. (will be inserted by the editor) Anurag Agarwal Vijay K. Garg Efficient Dependency Tracking for Relevant Events in Concurrent Systems Received: date / Accepted: date
More informationRelations, Functions, Binary Relations (Chapter 1, Sections 1.2, 1.3)
Relations, Functions, Binary Relations (Chapter 1, Sections 1.2, 1.3) CmSc 365 Theory of Computation 1. Relations Definition: Let A and B be two sets. A relation R from A to B is any set of ordered pairs
More informationOn the Compounds of Hat Matrix for Six-Factor Central Composite Design with Fractional Replicates of the Factorial Portion
American Journal of Computational and Applied Mathematics 017, 7(4): 95-114 DOI: 10.593/j.ajcam.0170704.0 On the Compounds of Hat Matrix for Six-Factor Central Composite Design with Fractional Replicates
More information2 Equivalence Relations
2 Equivalence Relations In mathematics, we often investigate relationships between certain objects (numbers, functions, sets, figures, etc.). If an element a of a set A is related to an element b of a
More informationFast Detection of Stable and Count Predicates in Parallel Computations
Fast Detection of Stable and Count Predicates in Parallel Computations Himanshu Chauhan 1 and Vijay K. Garg 1 1 University of Texas at Austin {himanshu@, garg@ece.}utexas.edu Abstract Enumerating all consistent
More informationThe dependence graph of a lattice
The depence graph of a lattice Karell Bertet L3I - Université de La Rochelle - av Michel Crépeau - 17042 La Rochelle kbertet@univ-lr.fr Abstract: In this paper, we introduce the depence graph of a lattice
More informationPosets, homomorphisms, and homogeneity
Posets, homomorphisms, and homogeneity Peter J. Cameron p.j.cameron@qmul.ac.uk Dedicated to Jarik Nešetřil on his sixtieth birthday HAPPY BIRTHDAY JARIK! Summary Jarik Nešetřil has made deep contributions
More informationA combinatorial view on derived codes
A combinatorial view on derived codes Relinde Jurrius (joint work with Philippe Cara) Vrije Universiteit Brussel, Belgium University of Neuchâtel, Switzerland Finite Geometries September 16, 2014 Relinde
More informationRelations on Hypergraphs
Relations on Hypergraphs John Stell School of Computing, University of Leeds RAMiCS 13 Cambridge, 17th September 2012 Relations on a Set Boolean algebra Converse R = R Complement R = R Composition & residuation
More informationInternational Mathematical Olympiad. Preliminary Selection Contest 2004 Hong Kong. Outline of Solutions 3 N
International Mathematical Olympiad Preliminary Selection Contest 004 Hong Kong Outline of Solutions Answers:. 8. 0. N 4. 49894 5. 6. 004! 40 400 7. 6 8. 7 9. 5 0. 0. 007. 8066. π + 4. 5 5. 60 6. 475 7.
More informationAntichain Algorithms for Finite Automata
Antichain Algorithms for Finite Automata Laurent Doyen 1 and Jean-François Raskin 2 1 LSV, ENS Cachan & CNRS, France 2 U.L.B., Université Libre de Bruxelles, Belgium Abstract. We present a general theory
More informationAutomata-based Verification - III
COMP30172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20: email: howard.barringer@manchester.ac.uk March 2009 Third Topic Infinite Word Automata Motivation Büchi Automata
More information0 1 d 010. h 0111 i g 01100
CMSC 5:Fall 07 Dave Mount Solutions to Homework : Greedy Algorithms Solution : The code tree is shown in Fig.. a 0000 c 0000 b 00 f 000 d 00 g 000 h 0 i 00 e Prob / / /8 /6 / Depth 5 Figure : Solution
More informationMultiple Choice Questions for Review
Equivalence and Order Multiple Choice Questions for Review In each case there is one correct answer (given at the end of the problem set). Try to work the problem first without looking at the answer. Understand
More informationAlgorithms: Lecture 12. Chalmers University of Technology
Algorithms: Lecture 1 Chalmers University of Technology Today s Topics Shortest Paths Network Flow Algorithms Shortest Path in a Graph Shortest Path Problem Shortest path network. Directed graph G = (V,
More informationA NEW CHARACTERIZATION OF COMPLETE HEYTING AND CO-HEYTING ALGEBRAS
Logical Methods in Computer Science Vol. 13(3:252017, pp. 1 11 www.lmcs-online.org Submitted Apr. 15, 2015 Published Sep. 14, 2017 A NEW CHARACTERIZATION OF COMPLETE HEYTING AND CO-HEYTING ALGEBRAS FRANCESCO
More informationFRACTIONAL REPLICATION
FRACTIONAL REPLICATION M.L.Agarwal Department of Statistics, University of Delhi, Delhi -. In a factorial experiment, when the number of treatment combinations is very large, it will be beyond the resources
More informationEfficient Dependency Tracking for Relevant Events in Shared-Memory Systems
Efficient Dependency Tracking for Relevant Events in Shared-Memory Systems Anurag Agarwal Dept of Computer Sciences The University of Texas at Austin Austin, TX 78712-233, USA anurag@cs.utexas.edu Vijay
More informationAsymptotic Analysis. Slides by Carl Kingsford. Jan. 27, AD Chapter 2
Asymptotic Analysis Slides by Carl Kingsford Jan. 27, 2014 AD Chapter 2 Independent Set Definition (Independent Set). Given a graph G = (V, E) an independent set is a set S V if no two nodes in S are joined
More informationConstruction of Mixed-Level Orthogonal Arrays for Testing in Digital Marketing
Construction of Mixed-Level Orthogonal Arrays for Testing in Digital Marketing Vladimir Brayman Webtrends October 19, 2012 Advantages of Conducting Designed Experiments in Digital Marketing Availability
More informationCOMP 355 Advanced Algorithms
COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Running Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that
More informationPhylogenetic Analysis. Han Liang, Ph.D. Assistant Professor of Bioinformatics and Computational Biology UT MD Anderson Cancer Center
Phylogenetic Analysis Han Liang, Ph.D. Assistant Professor of Bioinformatics and Computational Biology UT MD Anderson Cancer Center Outline Basic Concepts Tree Construction Methods Distance-based methods
More informationUndirected Graphs. V = { 1, 2, 3, 4, 5, 6, 7, 8 } E = { 1-2, 1-3, 2-3, 2-4, 2-5, 3-5, 3-7, 3-8, 4-5, 5-6 } n = 8 m = 11
Undirected Graphs Undirected graph. G = (V, E) V = nodes. E = edges between pairs of nodes. Captures pairwise relationship between objects. Graph size parameters: n = V, m = E. V = {, 2, 3,,,, 7, 8 } E
More informationSection Summary. Relations and Functions Properties of Relations. Combining Relations
Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included
More informationReading: Chapter 9.3. Carnegie Mellon
I II Lecture 3 Foundation of Data Flow Analysis Semi-lattice (set of values, meet operator) Transfer functions III Correctness, precision and convergence IV Meaning of Data Flow Solution Reading: Chapter
More information5. Data dependences and database schema design. Witold Rekuć Data Processing Technology 104
5. Data dependences and database schema design Witold Rekuć Data Processing Technology 104 DESIGN OF TABLES Anomalies of data modifications Key = {StoreNo, ProdId, DateOfSale} Witold Rekuć Data Processing
More informationA Survey of Rational Diophantine Sextuples of Low Height
A Survey of Rational Diophantine Sextuples of Low Height Philip E Gibbs philegibbs@gmail.com A rational Diophantine m-tuple is a set of m distinct positive rational numbers such that the product of any
More informationCOMP 182 Algorithmic Thinking. Relations. Luay Nakhleh Computer Science Rice University
COMP 182 Algorithmic Thinking Relations Luay Nakhleh Computer Science Rice University Chapter 9, Section 1-6 Reading Material When we defined the Sorting Problem, we stated that to sort the list, the elements
More informationFRACTIONAL FACTORIAL
FRACTIONAL FACTORIAL NURNABI MEHERUL ALAM M.Sc. (Agricultural Statistics), Roll No. 443 I.A.S.R.I, Library Avenue, New Delhi- Chairperson: Dr. P.K. Batra Abstract: Fractional replication can be defined
More informationCOMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background
COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that checks every
More informationTree sets. Reinhard Diestel
1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked
More informationGoal. Partially-ordered set. Game plan 2/2/2013. Solving fixpoint equations
Goal Solving fixpoint equations Many problems in programming languages can be formulated as the solution of a set of mutually recursive equations: D: set, f,g:dxd D x = f(x,y) y = g(x,y) Examples Parsing:
More informationGeometry Chapter 3 3-6: PROVE THEOREMS ABOUT PERPENDICULAR LINES
Geometry Chapter 3 3-6: PROVE THEOREMS ABOUT PERPENDICULAR LINES Warm-Up 1.) What is the distance between the points (2, 3) and (5, 7). 2.) If < 1 and < 2 are complements, and m < 1 = 49, then what is
More information2.2 Asymptotic Order of Growth. definitions and notation (2.2) examples (2.4) properties (2.2)
2.2 Asymptotic Order of Growth definitions and notation (2.2) examples (2.4) properties (2.2) Asymptotic Order of Growth Upper bounds. T(n) is O(f(n)) if there exist constants c > 0 and n 0 0 such that
More informationCS 584 Data Mining. Association Rule Mining 2
CS 584 Data Mining Association Rule Mining 2 Recall from last time: Frequent Itemset Generation Strategies Reduce the number of candidates (M) Complete search: M=2 d Use pruning techniques to reduce M
More informationSkylines. Yufei Tao. ITEE University of Queensland. INFS4205/7205, Uni of Queensland
Yufei Tao ITEE University of Queensland Today we will discuss problems closely related to the topic of multi-criteria optimization, where one aims to identify objects that strike a good balance often optimal
More informationAutomata-based Verification - III
CS3172: Advanced Algorithms Automata-based Verification - III Howard Barringer Room KB2.20/22: email: howard.barringer@manchester.ac.uk March 2005 Third Topic Infinite Word Automata Motivation Büchi Automata
More informationPin-Permutations: Characterization and Generating Function. Frédérique Bassino Mathilde Bouvel Dominique Rossin
: Characterization and Generating Function Frédérique Bassino Dominique Rossin Journées Permutations et Combinatoire, Projet ANR GAMMA, Nov. 2008 liafa Main result of the talk Conjecture[Brignall, Ruškuc,
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationModel Checking with CTL. Presented by Jason Simas
Model Checking with CTL Presented by Jason Simas Model Checking with CTL Based Upon: Logic in Computer Science. Huth and Ryan. 2000. (148-215) Model Checking. Clarke, Grumberg and Peled. 1999. (1-26) Content
More informationEvent Operators: Formalization, Algorithms, and Implementation Using Interval- Based Semantics
Department of Computer Science and Engineering University of Texas at Arlington Arlington, TX 76019 Event Operators: Formalization, Algorithms, and Implementation Using Interval- Based Semantics Raman
More informationMaximum Flow Problem (Ford and Fulkerson, 1956)
Maximum Flow Problem (Ford and Fulkerson, 196) In this problem we find the maximum flow possible in a directed connected network with arc capacities. There is unlimited quantity available in the given
More informationFrom Distributions to Markov Networks. Sargur Srihari
From Distributions to Markov Networks Sargur srihari@cedar.buffalo.edu 1 Topics The task: How to encode independencies in given distribution P in a graph structure G Theorems concerning What type of Independencies?
More informationD B M G Data Base and Data Mining Group of Politecnico di Torino
Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket
More informationLecture 12: 2 k p Fractional Factorial Design
Lecture 12: 2 k p Fractional Factorial Design Montgomery: Chapter 8 Page 1 Fundamental Principles Regarding Factorial Effects Suppose there are k factors (A,B,...,J,K) in an experiment. All possible factorial
More informationThe VLDB Journal Using Functional Dependencies for Optimizing Multidimensional Skyline Queries
The VLDB Journal Using Functional Dependencies for Optimizing Multidimensional Skyline Queries --Manuscript Draft-- Manuscript Number: Full Title: Article Type: Keywords: Corresponding Author: Using Functional
More informationα-acyclic Joins Jef Wijsen May 4, 2017
α-acyclic Joins Jef Wijsen May 4, 2017 1 Motivation Joins in a Distributed Environment Assume the following relations. 1 M[NN, Field of Study, Year] stores data about students of UMONS. For example, (19950423158,
More informationAutomata and Languages
Automata and Languages Prof. Mohamed Hamada Software Engineering Lab. The University of Aizu Japan Mathematical Background Mathematical Background Sets Relations Functions Graphs Proof techniques Sets
More informationTwo Applications of Maximum Flow
Two Applications of Maximum Flow The Bipartite Matching Problem a bipartite graph as a flow network maximum flow and maximum matching alternating paths perfect matchings 2 Circulation with Demands flows
More informationAssociation Rules. Fundamentals
Politecnico di Torino Politecnico di Torino 1 Association rules Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket counter Association rule
More informationMATH602: APPLIED STATISTICS
MATH602: APPLIED STATISTICS Dr. Srinivas R. Chakravarthy Department of Science and Mathematics KETTERING UNIVERSITY Flint, MI 48504-4898 Lecture 10 1 FRACTIONAL FACTORIAL DESIGNS Complete factorial designs
More informationCovering Linear Orders with Posets
Covering Linear Orders with Posets Proceso L. Fernandez, Lenwood S. Heath, Naren Ramakrishnan, and John Paul C. Vergara Department of Information Systems and Computer Science, Ateneo de Manila University,
More informationCollinearity/Concurrence
Collinearity/Concurrence Ray Li (rayyli@stanford.edu) June 29, 2017 1 Introduction/Facts you should know 1. (Cevian Triangle) Let ABC be a triangle and P be a point. Let lines AP, BP, CP meet lines BC,
More informationPairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events
Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle
More informationMAD. Models & Algorithms for Distributed systems -- 2/5 -- download slides at
MAD Models & Algorithms for Distributed systems -- /5 -- download slides at http://people.rennes.inria.fr/eric.fabre/ 1 Today Runs/executions of a distributed system are partial orders of events We introduce
More informationThe Meet-Over-All-Paths Solution to Data-Flow Problems
The Meet-Over-All-Paths Solution to Data-Flow Problems Consider a monotone dataflow framework (L,,F). Assume that the functions f B F represent the effect of a basic block on the sets conatining data for
More informationD B M G. Association Rules. Fundamentals. Fundamentals. Elena Baralis, Silvia Chiusano. Politecnico di Torino 1. Definitions.
Definitions Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Itemset is a set including one or more items Example: {Beer, Diapers} k-itemset is an itemset that contains k
More information{a, b, c} {a, b} {a, c} {b, c} {a}
Section 4.3 Order Relations A binary relation is an partial order if it transitive and antisymmetric. If R is a partial order over the set S, we also say, S is a partially ordered set or S is a poset.
More informationD B M G. Association Rules. Fundamentals. Fundamentals. Association rules. Association rule mining. Definitions. Rule quality metrics: example
Association rules Data Base and Data Mining Group of Politecnico di Torino Politecnico di Torino Objective extraction of frequent correlations or pattern from a transactional database Tickets at a supermarket
More informationMining Approximative Descriptions of Sets Using Rough Sets
Mining Approximative Descriptions of Sets Using Rough Sets Dan A. Simovici University of Massachusetts Boston, Dept. of Computer Science, 100 Morrissey Blvd. Boston, Massachusetts, 02125 USA dsim@cs.umb.edu
More informationDivide-and-Conquer Algorithms Part Two
Divide-and-Conquer Algorithms Part Two Recap from Last Time Divide-and-Conquer Algorithms A divide-and-conquer algorithm is one that works as follows: (Divide) Split the input apart into multiple smaller
More informationPairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events
Pairing Transitive Closure and Reduction to Efficiently Reason about Partially Ordered Events Massimo Franceschet Angelo Montanari Dipartimento di Matematica e Informatica, Università di Udine Via delle
More informationDesign theory for relational databases
Design theory for relational databases 1. Consider a relation with schema R(A,B,C,D) and FD s AB C, C D and D A. a. What are all the nontrivial FD s that follow from the given FD s? You should restrict
More informationAutomatic Verification of Parameterized Data Structures
Automatic Verification of Parameterized Data Structures Jyotirmoy V. Deshmukh, E. Allen Emerson and Prateek Gupta The University of Texas at Austin The University of Texas at Austin 1 Outline Motivation
More informationClC (X ) : X ω X } C. (11)
With each closed-set system we associate a closure operation. Definition 1.20. Let A, C be a closed-set system. Define Cl C : : P(A) P(A) as follows. For every X A, Cl C (X) = { C C : X C }. Cl C (X) is
More informationNotation Index. gcd(a, b) (greatest common divisor) NT-16
Notation Index (for all) B A (all functions) B A = B A (all functions) SF-18 (n) k (falling factorial) SF-9 a R b (binary relation) C(n,k) = n! k! (n k)! (binomial coefficient) SF-9 n! (n factorial) SF-9
More informationFrequent Itemset Mining
ì 1 Frequent Itemset Mining Nadjib LAZAAR LIRMM- UM COCONUT Team (PART I) IMAGINA 17/18 Webpage: http://www.lirmm.fr/~lazaar/teaching.html Email: lazaar@lirmm.fr 2 Data Mining ì Data Mining (DM) or Knowledge
More informationComputational Complexity. IE 496 Lecture 6. Dr. Ted Ralphs
Computational Complexity IE 496 Lecture 6 Dr. Ted Ralphs IE496 Lecture 6 1 Reading for This Lecture N&W Sections I.5.1 and I.5.2 Wolsey Chapter 6 Kozen Lectures 21-25 IE496 Lecture 6 2 Introduction to
More informationConsistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms. CS 249 Project Fall 2005 Wing Wong
Consistent Global States of Distributed Systems: Fundamental Concepts and Mechanisms CS 249 Project Fall 2005 Wing Wong Outline Introduction Asynchronous distributed systems, distributed computations,
More informationThe Relative Complexity of Updates for a Class of Database Views
The Relative Complexity of Updates for a Class of Database Views Stephen J. Hegner Umeå University Department of Computing Science SE-901 87 Umeå, Sweden hegner@cs.umu.se http://www.cs.umu.se/~hegner Abstract.
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationFinding optimal configurations ( combinatorial optimization)
CS 1571 Introduction to AI Lecture 10 Finding optimal configurations ( combinatorial optimization) Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square Constraint satisfaction problem (CSP) Constraint
More informationCS 484 Data Mining. Association Rule Mining 2
CS 484 Data Mining Association Rule Mining 2 Review: Reducing Number of Candidates Apriori principle: If an itemset is frequent, then all of its subsets must also be frequent Apriori principle holds due
More information2. ALGORITHM ANALYSIS
2. ALGORITHM ANALYSIS computational tractability asymptotic order of growth survey of common running times Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos
More informationVisit: ImperialStudy.com For More Study Materials Class IX Chapter 12 Heron s Formula Maths
Exercise 1.1 1. Find the area of a triangle whose sides are respectively 150 cm, 10 cm and 00 cm. The triangle whose sides are a = 150 cm b = 10 cm c = 00 cm The area of a triangle = s(s a)(s b)(s c) Here
More informationBreadth First Search, Dijkstra s Algorithm for Shortest Paths
CS 374: Algorithms & Models of Computation, Spring 2017 Breadth First Search, Dijkstra s Algorithm for Shortest Paths Lecture 17 March 1, 2017 Chandra Chekuri (UIUC) CS374 1 Spring 2017 1 / 42 Part I Breadth
More informationDesign of a Sliding Window over Asynchronous Event Streams
1 Design of a Sliding Window over Asynchronous Event Streams Yiling Yang 1,2, Yu Huang 1,2, Jiannong Cao 3, Xiaoxing Ma 1,2, Jian Lu 1,2 1 State Key Laboratory for Novel Software Technology Nanjing University,
More informationMethods for finding optimal configurations
CS 1571 Introduction to AI Lecture 9 Methods for finding optimal configurations Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Search for the optimal configuration Optimal configuration search:
More informationClass 5. Review; questions. Data-flow Analysis Review. Slicing overview Problem Set 2: due 9/3/09 Problem Set 3: due 9/8/09
Class 5 Review; questions Assign (see Schedule for links) Slicing overview Problem Set 2: due 9/3/09 Problem Set 3: due 9/8/09 1 Data-flow Analysis Review Start at slide 21 of Basic Analysis 3 1 Static
More informationDiscrete Mathematics. 2. Relations
Discrete Mathematics 2. Relations Binary Relations Let A, B be any two sets. A binary relation R from A to B is a subset of A B. E.g., Let < : N N : {(n,m) n < m} The notation a R b or arb means (a,b)îr.
More informationGraphs, matroids and the Hrushovski constructions
Graphs, matroids and the Hrushovski constructions David Evans, School of Mathematics, UEA, Norwich, UK Algebra, Combinatorics and Model Theory, Koç University, Istanbul August 2011. ACMT () August 2011
More informationParallel & Distributed Systems group
Happened Before is the Wrong Model for Potential Causality Ashis Tarafdar and Vijay K. Garg TR-PDS-1998-006 July 1998 PRAESIDIUM THE UNIVERSITY OF TEXAS DISCIPLINA CIVITATIS AT AUSTIN Parallel & Distributed
More information2MA105 Algebraic Structures I
2MA105 Algebraic Structures I Per-Anders Svensson http://homepage.lnu.se/staff/psvmsi/2ma105.html Lecture 12 Partially Ordered Sets Lattices Bounded Lattices Distributive Lattices Complemented Lattices
More informationConstraint satisfaction search. Combinatorial optimization search.
CS 1571 Introduction to AI Lecture 8 Constraint satisfaction search. Combinatorial optimization search. Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square Constraint satisfaction problem (CSP) Objective:
More informationHill climbing: Simulated annealing and Tabu search
Hill climbing: Simulated annealing and Tabu search Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Hill climbing Instead of repeating local search, it is
More informationDefinition: A binary relation R from a set A to a set B is a subset R A B. Example:
Chapter 9 1 Binary Relations Definition: A binary relation R from a set A to a set B is a subset R A B. Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B.
More informationRamsey theory of homogeneous structures
Ramsey theory of homogeneous structures Natasha Dobrinen University of Denver Notre Dame Logic Seminar September 4, 2018 Dobrinen big Ramsey degrees University of Denver 1 / 79 Ramsey s Theorem for Pairs
More informationEnumeration Schemes for Words Avoiding Permutations
Enumeration Schemes for Words Avoiding Permutations Lara Pudwell November 27, 2007 Abstract The enumeration of permutation classes has been accomplished with a variety of techniques. One wide-reaching
More informationAppendix A. Definitions for Ordered Sets. The appendices contain all the formal definitions, propositions and proofs for
161 Appendix A Definitions for Ordered Sets The appendices contain all the formal definitions, propositions and proofs for developing a model of the display process based on lattices. Here we list some
More information